Hacker Newsnew | past | comments | ask | show | jobs | submit | wyes's commentslogin

100%

"The crown jewel? Your 8-digit gym door PIN is your API password and you most likely didn't set it yourself. The same PIN that hasn't changed since the iPhone 8 was cutting-edge technology."

Reads directly from ChatGPT


They have gotten worse.


Interesting to see that AI search was basically turned off during the election time. edit: no the election was later, why we're AI searches basically non-existent mid sept - mid oct?


https://fediverse.observer/stats was the link i noticed some similar trend as you mentioned. scroll down a bit to the monthly graphs and there's a huge dip that coincides with your observation about AI search.

so is there that much "AI Traffic" on the internet, or were people outside doing activism or something? who knows.


Interestingly, I saw a graph of Fediverse posts and servers that were online or offline. The months of September, October and November, there was a sharp dip from like, you know, 15,000 to 5,000 say. And then after November it went back up.

If I remember to look at this comment tomorrow, I will post an image link that I grabbed or post the source info. I asked the person who collected it, or the group who collected it, and I said, hey, what happened there? Why is that huge dip in the graph?

I don't think I've gotten a reply yet.


Attestation will run on the RoT.

>While we’re publishing the binary images of every production PCC build, to further aid research we will periodically also publish a subset of the security-critical PCC source code.

I expect that they'll publish the attestation source code.

But, basically what will happen is the Verifier will request a certain memory region to be attested, then that region will be hashed and the digest will be sent back to the Verifier. If the memory is different from what is expected, the hash digest will NOT match.


They rely on Trusted Execution Environments and the fact that hash functions are one-way functions.

Verifier -> requests a Prover to attest its software state

Prover -> goes into RoT, verifies authenticity of Verifier (and request), computes hash of attested memory region, sends hash digest

Verifier -> receives digest and compares to known hash

> What’s stopping remote endpoint always responding “yes” The attestation code is inside of a RoT, so a bad actor shouldn't be able to call this code, only callable by receiving a request from a Verifier


We use F* for some of our crypto for embedded systems software :D


It suggested securedomain.co, but when I clicked it it actually meant securedomain.co.in


It’s a bug. I’ll fix it soon.


Zipf’s law is also super useful for web caching


How will you use it for web caching?


Requests follow an inverse log relationship of request frequency.

A little caching buys you tremendous savings in regeneration or back-end fetching.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: